Login / Signup

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.

Paul C. van OorschotMichael J. Wiener
Published in: CRYPTO (1996)
Keyphrases
  • orders of magnitude
  • state space
  • countermeasures
  • search problems
  • brute force search
  • sat solvers
  • malicious attacks
  • security protocols
  • reinforcement learning